-
Go to the compliance portal and sign in using an account that can assign permissions.
-
In the left pane, select Roles & scopes > Permissions.
-
On the Permissions page, under Microsoft Purview solutions, select Roles.
-
On the Role groups for Microsoft Purview solutions page, select eDiscovery Manager.
-
On the eDiscovery Manager flyout pane, do one of the following based on the eDiscovery permissions that you want to assign.
- Select Edit.
- On the Manage eDiscovery Manager page, select Choose users.
- Search and select the user (or users) you want to add as an eDiscovery Manager, and then select Select.
- Select Next.
- To assign a user (or users) to the eDiscovery Administrator role group, select Choose users.
- Search and select the user (or users) you want to add as an eDiscovery Administrator, and then select Select.
- Select Next.
- On the Review the role group and finish page, review the role group changes. Select Save to save the changes to the eDiscovery role groups.
Archive for the ‘Microsoft 365’ Category
Assign eDiscovery permissions
Monday, October 7th, 2024Microsoft 365 apps activation error “Another account from your organization is already signed in on this computer”
Thursday, March 14th, 2024For Mac devices, follow these steps:
-
Close all Microsoft 365 apps.
-
Open Terminal, and then run the following command:
defaults write com.microsoft.Word ResetOneAuthCreds -bool YES
-
Open the Microsoft Word app and continue with the activation steps.
Enable External Forwarding in Microsoft 365
Tuesday, February 13th, 2024How to Save Sent Items in “Shared” Mailbox
Thursday, February 9th, 2023Set-Mailbox <SharedMailboxIdentity> -MessageCopyForSentAsEnabled $true
Set-Mailbox <SharedMailboxIdentity> -MessageCopyForSendOnBehalfEnabled $true
Add Azure Active Directory User to Local Administrators Group
Friday, December 3rd, 2021-
Login to the PC as the Azure AD user you want to be a local admin. This gets the GUID onto the PC.
-
Log out as that user and login as a local admin user.
-
Open a command prompt as Administrator and using the command line, add the user to the administrators group. As an example, if I had a user called John Doe, the command would be “net localgroup administrators AzureAD\JohnDoe /add” without the quotes
Assign eDiscovery permissions in the Microsoft 365 compliance center
Wednesday, August 25th, 2021Assign eDiscovery permissions
-
Go to https://compliance.microsoft.com and sign in using an account that can assign permissions.
-
In the left pane of the Microsoft 365 compliance center, select Permissions.
-
On the Permissions & Roles page, under Compliance center, click Roles.
-
On the Compliance center roles page, select eDiscovery Manager.
-
On the eDiscovery Manager flyout page, do one of the following based on the eDiscovery permissions that you want to assign.
To make a user an eDiscovery Manager: Next to eDiscovery Manager, select Edit. On the Choose eDiscovery Manager wizard page, click Add. Select the user (or users) you want to add as an eDiscovery manager, and then select Add. When you’re finished adding users, select Done. Then, on the Editing Choose eDiscovery Manager wizard page, select Save to save the changes to the eDiscovery Manager membership.
To make a user an eDiscovery Administrator: Next to eDiscovery Administrator, select Edit. On the Choose eDiscovery Administrator page, click Add. Select the user (or users) you want to add as an eDiscovery Administrator, and then Add. When you’re finished adding users, select Done. Then, on the Editing Choose eDiscovery Administrator wizard page, select Save to save the changes to the eDiscovery Administrator membership.
Enable Automatic External Forwarding for Individual Mailboxes
Friday, April 16th, 2021- Log in to your Office 365 Security & Compliance portal for Microsoft 365 and choose Threat management > Anti-spam or head directly to the Anti-spam settings page here: https://protection.office.com/antispam.
- 2
- Click + Create an outbound policy.
- 3
- Give your new outbound spam filter policy a Name and Description. Click the down arrow next to Automatic forwarding to expand that section. Choose On – Forwarding is enabled from the dropdown.
- 4
- Click the down arrow next to Applied to, then +Add a condition. Choose Sender is from the dropdown list, then click in Add a tag to find the email account(s) you’d like to allow to automatically forward and select them. Click Save.
Enable Automatic External Forwarding for All Mailboxes
Friday, April 16th, 2021Log in to your Office 365 Security & Compliance portal for Microsoft 365 and choose Threat management > Anti-spam or head directly to the Anti-spam settings page here: https://protection.office.com/antispam
2Click the down arrow next to Outbound spam filter policy (always ON) and click the Edit policy button.
3Click the down arrow next to Automatic forwarding, then choose On – Forwarding is enabled from the dropdown. Click Save.
To disable the password reset functionality – Microsoft365
Saturday, March 20th, 2021
|
What are security defaults
Monday, March 15th, 2021Managing security can be difficult with common identity-related attacks like password spray, replay, and phishing becoming more and more popular. Security defaults make it easier to help protect your organization from these attacks with preconfigured security settings:
- Requiring all users to register for Azure AD Multi-Factor Authentication.
- Requiring administrators to perform multi-factor authentication.
- Blocking legacy authentication protocols.
- Requiring users to perform multi-factor authentication when necessary.
- Protecting privileged activities like access to the Azure portal.